{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T04:32:17Z","timestamp":1744173137748,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642332593"},{"type":"electronic","value":"9783642332609"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33260-9_21","type":"book-chapter","created":{"date-parts":[[2012,9,20]],"date-time":"2012-09-20T08:27:01Z","timestamp":1348129621000},"page":"242-253","source":"Crossref","is-referenced-by-count":7,"title":["Hybrid Negative Selection Approach for Anomaly Detection"],"prefix":"10.1007","author":[{"given":"Andrzej","family":"Chmielewski","sequence":"first","affiliation":[]},{"given":"S\u0142awomir T.","family":"Wierzcho\u0144","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1007\/3-540-44503-X_27","volume-title":"Database Theory - ICDT 2001","author":"C.C. Aggarwal","year":"2001","unstructured":"Aggarwal, C.C., Hinneburg, A., Keim, D.A.: On the Surprising Behavior of Distance Metrics in High Dimensional Space. In: Van den Bussche, J., Vianu, V. (eds.) ICDT 2001. LNCS, vol.\u00a01973, pp. 420\u2013434. Springer, Heidelberg (2001)"},{"key":"21_CR2","unstructured":"Balthrop, J., Esponda, F., Forrest, S., Glickman, M.: Coverage and generalization in an artificial immune system. In: Proc. of the Genetic and Evolutionary Computation Conference (GECCO 2002), New York, July 9-13, pp. 3\u201310 (2002)"},{"key":"21_CR3","unstructured":"de Castro, L., Timmis, J.: Artificial Immune Systems: A New Computational Intelligence Approach. Springer (2002)"},{"key":"21_CR4","first-page":"39","volume":"2","author":"A. Chmielewski","year":"2007","unstructured":"Chmielewski, A., Wierzcho\u0144, S.T.: On the distance norms for multidimensional dataset in the case of real-valued negative selection application. Zeszyty Naukowe Politechniki Bia\u0142ostockiej\u00a0(2), 39\u201350 (2007)","journal-title":"Zeszyty Naukowe Politechniki Bia\u0142ostockiej"},{"key":"21_CR5","unstructured":"Dasgupta, D., Forrest, S.: Novelty detection in time series data using ideas from immunology. In: Fifth International Conf. on Intelligent Systems, Reno, Nevada, June 19-21 (1996)"},{"key":"21_CR6","unstructured":"Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A.: A sense of Self for Unix Processes. In: Proc. of the 1996 IEEE Symposium on Research in Security and Privacy, pp. 120\u2013128. IEEE Computer Society Press (1996)"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Forrest, S., Perelson, A., Allen, L., Cherukuri, R.: Self-nonself discrimination in a computer. In: Proc. of the IEEE Symposium on Research in Security and Privacy, Los Alamitos, pp. 202\u2013212 (1994)","DOI":"10.1109\/RISP.1994.296580"},{"key":"21_CR8","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1109\/TEVC.2002.1011540","volume":"6","author":"P.K. Harmer","year":"2002","unstructured":"Harmer, P.K., Wiliams, P.D., Gunsch, G.H., Lamont, G.B.: Artificial immune system architecture for computer security applications. IEEE Trans. on Evolutionary Computation\u00a06, 252\u2013280 (2002)","journal-title":"IEEE Trans. on Evolutionary Computation"},{"issue":"4","key":"21_CR9","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1162\/106365600568257","volume":"8","author":"S. Hofmeyr","year":"2000","unstructured":"Hofmeyr, S., Forrest, S.: Architecture for an Artificial Immune System. Evolutionary Computation J.\u00a08(4), 443\u2013473 (2000)","journal-title":"Evolutionary Computation J."},{"key":"21_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/978-3-540-24854-5_30","volume-title":"Genetic and Evolutionary Computation \u2013 GECCO 2004","author":"Z. Ji","year":"2004","unstructured":"Ji, Z., Dasgupta, D.: Real-Valued Negative Selection Algorithm with Variable-Sized Detectors. In: Deb, K., Tari, Z. (eds.) GECCO 2004, Part I. LNCS, vol.\u00a03102, pp. 287\u2013298. Springer, Heidelberg (2004)"},{"issue":"2","key":"21_CR11","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1162\/evco.2007.15.2.223","volume":"15","author":"Z. Ji","year":"2007","unstructured":"Ji, Z., Dasgupta, D.: Revisiting negative selection algorithms. Evolutionary Computation\u00a015(2), 223\u2013251 (2007)","journal-title":"Evolutionary Computation"},{"key":"21_CR12","doi-asserted-by":"crossref","unstructured":"Sayood, K.: Introduction to Data Compression. Elsevier (2005)","DOI":"10.1016\/B978-012620862-7\/50006-7"},{"key":"21_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/BFb0095133","volume-title":"Foundations of Intelligent Systems","author":"J. Stepaniuk","year":"1999","unstructured":"Stepaniuk, J.: Rough Set Data Mining of Diabetes Data. In: Ra\u015b, Z.W., Skowron, A. (eds.) ISMIS 1999. LNCS, vol.\u00a01609, pp. 457\u2013465. Springer, Heidelberg (1999)"},{"key":"21_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1007\/978-3-540-73922-7_13","volume-title":"Artificial Immune Systems","author":"T. Stibor","year":"2007","unstructured":"Stibor, T.: Phase Transition and the Computational Complexity of Generating r-Contiguous Detectors. In: de Castro, L.N., Von Zuben, F.J., Knidel, H. (eds.) ICARIS 2007. LNCS, vol.\u00a04628, pp. 142\u2013155. Springer, Heidelberg (2007)"},{"key":"21_CR15","first-page":"47","volume":"17","author":"M. Tabedzki","year":"2008","unstructured":"Tabedzki, M., Rybnik, M., Saaeed, K.: Method for handwritten word recognition without segmentation. Polish J. of Environmental Studies\u00a017, 47\u201352 (2008)","journal-title":"Polish J. of Environmental Studies"},{"issue":"1","key":"21_CR16","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.tcs.2008.02.011","volume":"403","author":"J. Timmis","year":"2008","unstructured":"Timmis, J., Hone, A., Stibor, T., Clark, E.: Theoretical advances in artifical immune systems. Theoretical Computer Science\u00a0403(1), 11\u201332 (2008)","journal-title":"Theoretical Computer Science"},{"key":"21_CR17","doi-asserted-by":"crossref","unstructured":"Wierzcho\u0144, S.T.: Generating optimal repertoire of antibody strings in an artificial immune system. In: K\u0142opotek, M.A., Michalewicz, M., Wierzcho\u0144, S.T. (eds.) Proc. of the IIS 2000 Symposium on Intelligent Information Systems, Bystra, Poland, June 12-16, pp. 119\u2013133. Springer (2000)","DOI":"10.1007\/978-3-7908-1846-8_12"},{"key":"21_CR18","unstructured":"Wierzcho\u0144, S.T.: Deriving concise description of non-self patterns in an artificial immune system. In: Jain, L.C., Kacprzyk, J. (eds.) New Learning Paradigm in Soft Comptuning, pp. 438\u2013458. Physica-Verlag (2001)"}],"container-title":["Lecture Notes in Computer Science","Computer Information Systems and Industrial Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33260-9_21.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T02:20:38Z","timestamp":1744165238000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33260-9_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642332593","9783642332609"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33260-9_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}